Skip to content
Snippets Groups Projects
  1. Jul 16, 2020
  2. May 21, 2020
  3. Feb 10, 2020
  4. Oct 24, 2019
  5. Sep 16, 2019
  6. Sep 04, 2019
  7. Aug 29, 2019
  8. Aug 12, 2019
    • Ken Zhu's avatar
      openswan: fix too much opportunistic connection issue · b796b196
      Ken Zhu authored
      
      When the side is in responder state and no active connection, the
      kernel will send a request to start the connection. in the circumstance
      of the peer keeps restarting, this case will cause the connection
      keeping increasing and memory consuming.
      Before start new connection, looking for if there is any connection
      existing for the new pair, if it exists, don't creat new connection.
      
      Change-Id: I8c38434824380ed46cd99dcd399d0300c7e80423
      Signed-off-by: default avatarKen Zhu <guigenz@codeaurora.org>
      b796b196
  9. Aug 08, 2019
  10. Aug 06, 2019
  11. Aug 05, 2019
  12. Jul 29, 2019
  13. Jul 25, 2019
  14. Jul 22, 2019
  15. Jul 19, 2019
  16. Jul 17, 2019
  17. Jul 02, 2019
  18. Jul 01, 2019
  19. May 17, 2019
    • Ken Zhu's avatar
      rstp: Fix daemon exit unexpected · c2d1b12d
      Ken Zhu authored
      
      When using rstpctl command to stop the rstp service, the daemon will
      stop unexpectedly.
      it exits because the rcvmsg returns error that no buffer space available, 
      but this is not a critical issue, let it ignore this and continue.
      
      Change-Id: Ia20978a9dd846c24a6fef9604346f1356f44adc3
      Signed-off-by: default avatarKen Zhu <guigenz@codeaurora.org>
      c2d1b12d
  20. Apr 19, 2019
  21. Mar 07, 2019
  22. Feb 21, 2019
  23. Feb 01, 2019
  24. Jan 24, 2019
  25. Jan 14, 2019
  26. Jan 13, 2019
  27. Jan 02, 2019
    • Ken Zhu's avatar
      openswan: SA is not deleted in the responder · 8dfdb366
      Ken Zhu authored
      
      Some SAs may be initiated in the responder side, when the initiator
      restarted, these SAs in the responder are not deleted.
      
      Request of SA delete fails to verify the message id and gets dropped
      
      state should update the next-use message id after sending out a message.
      
      Change-Id: I22225ab9236a04b7e0f5d8a9300c5b28fc0ec25f
      Signed-off-by: default avatarKen Zhu <guigenz@codeaurora.org>
      8dfdb366
  28. Dec 21, 2018
  29. Nov 28, 2018
  30. Nov 16, 2018
  31. Nov 01, 2018
  32. Sep 20, 2018
  33. Aug 20, 2018
  34. Jul 28, 2018
    • Xiaoping Fan's avatar
      [rstp]: flush fdb on cpu port of Dakota board when topology changed · 8a1298a6
      Xiaoping Fan authored
      
      A former commit 45204d84 is to do the
      same thing in Akronite board. But this commit is for Dakota board.
      
      In Dakota board, qca header is inserted by EDMA driver, so we don't
      need to enable qca header in hardware for cpu/mirror port. But we
      still need to flush FDB on cpu port when topology changed.
      
      So we added a attribute of cpu/mirror port to identify if qca header
      is inserted by EDMA driver.
      
      Change-Id: I46ca85bd66bc09b6463ae28307e867c7177d8417
      Signed-off-by: default avatarZhu Ken <guigenz@codeaurora.org>
      (cherry picked from commit 4eb48400)
      8a1298a6
  35. Jun 08, 2018
  36. May 04, 2018
  37. May 03, 2018
  38. Apr 12, 2018
  39. Mar 23, 2018
Loading